An Overview of Spam Phenomenon; and the Key Findings of a Survey for Spam in Greece

Size: px
Start display at page:

Download "An Overview of Spam Phenomenon; and the Key Findings of a Survey for Spam in Greece"

Transcription

1 An Overview of Spam Phenomenon; and the Key Findings of a Survey for Spam in Greece Anastasios A. Pallas 1, Charalampos Z. Patrikakis 2 1 School of Computing, University of Paisley, PA1 2BE, Scotland, tpallas@sch.gr 2 TEI Peiraeus, Automation Deptm. Thivon 250, Aigaleo, Athens, Greece Abstract Spam has been involved in the every day life of users. They actually recognized it when they get annoyed with advertisements, bulk messages or in general all the unwanted e- mails in their mailbox. Recently, spam phenomenon has been also found to speak the Greek language; and some international flavors to shifting from annoying to threatening Internet users, which in effect constitute a major security and fraud issue over Internet. In the current paper, apart from introducing spam problem and providing an overview of its current countermeasures (anti-spamming), we present the most significant key finding from our survey for the spam phenomenon in Greece. Our areas of interest cover some of the major spam issues such as: awareness, impact, costs, legislation and anti-spamming. Introducing Spam The actual provenance of the word spam is derived from the words spiced ham (first entry in 1937) for describing a tinned meat made mainly from ham by Hormel Foods Corporation. In the electronic world, spam has not an official definition, thus some people consider advertisement via e- mails as spam, and others consider spam as just all unwanted s in their mailbox even though they are coming from their mammy. Actually, there are two rather official definitions for spam : Unsolicited Commercial (UCE) and Unsolicited Bulk (UBE). The term UCE is most frequently used in United States and widely used into its most important spam law formally called CAN-SPAM Act of 2003 [3]. UCE is explicitly used for commercial messages or in other words advertisements, such as messages with pornographic content, marketing of illegal software, etc. Although, the definition of UCE (along with CAN-SPAM Act of 2003) is very important, it excludes messages that can be spam and they are clearly not commercial in nature, for example political, frauds, malicious messages and many others, which are covered by UBE definition. General speaking, UBE is more broaden definition of spam covering messages sent to a large number of recipients who have not opt-in (i.e. give prior consent in written or electronic format) or have opt-out (i.e. asked somehow to unsubscribe). Besides, US law has a major drawback as it allows e-marketers to legitimately send messages as long as a recipient has not opts-out (i.e. opt-out approach to spam problem). In contrast within Europe Union, spam is prohibited by the European Directive for e-privacy 2002/58/EC, which clearly requires that commercial communication should not be allowed without recipients' prior consent, meaning that recipients have to prior opt-in in order to legitimately receive commercial messages (i.e. opt-in approach to spam problem) [4]. 1

2 Anti-Spamming Spam is meant to be one of the most critical problems upon Internet, nowadays. First of all, it wastes Internet users precious time. It is also contributes to the misuse of Internet bandwidth, computers processing power and storage capacity worldwide. Furthermore, there are also many hidden and rather difficult to be measured effects due to spam, such as the lost of legitimate s namely False Positives (FP) effect, the misleading of Internet consumers, exposure to unethical content for children, electronic frauds, etc. As a matter of fact, there have been also deployed a number of countermeasures, which are trying to moderate spam phenomenon (namely antispamming). For clarity reasons, we are going to present here a rather conceptual view of these approaches and not drill down to technical analysis. In general, there are three primarily not overlapped approaches: legal, social and technical [10]. Providing a more detail analysis of the efforts held in the technology-based approach, we can further distinguish countermeasures based on: i) where they reside and ii) how they react against spammer s techniques. In the first case, we can distinguish anti-spamming efforts that reside either to the side of the server or in other words to the Mail Transport Agent (MTA) of an service provider (i.e. namely mailer-based or server-based) or to those that run to the user s computer (i.e. namely user-based or client-based). In the second case, we can depict anti-spamming efforts into complementary approaches versus spammers methodologies [5]: Protect addresses: Spammers are trying to harvest addresses by using a number of methods, such as dictionary attacks to mailer and collect them from web sites. Preventing an address to be listed from spammers is mainly a set of directives and techniques that users can adopt. For instance, a rather effective technique has been proven to be the masquerading of addresses when they are going to be used in web sites, forums, etc by replacing for example the at symbol (@) or the dot (.) or by using more complicated methods [7][8]. Prevent spam from being sent: It is very common for spammers to use compromised/hijacked computers (also called as zombie) all around the world in order to send unsolicited messages. Preventing spam from being sent involves not only the regular checks of computers security holes, but also blocking of SMTP and proxy relays. Block spam to be delivered: There are a number of different techniques here that are trying to identify spam messages before actually reach our mailbox. Some of them are checking sender authentication such as Sender Policy Framework (SPF) and blocking exploited sources of known spammer based on IP or DNS (i.e. DNSBLs 1 ) [16]. Usually these methods have been widely adopted by Internet Services providers in order to refuse delivery of spam messages. Identify and separate spam after delivery: Spammers are continually inventing new tricks in order to spoof anti-spamming filters. Identifying spam based on content analysis of the messages has been proven to be very difficult indeed. However, two methods have been proven here to be more effective: i) the analysis that is based on the targeted link (i.e. URI 2 analysis and SURBLs 3 ) and ii) Bayesian filters that are relying on adaptive filtering algorithms. As we already mention, the above technology-based techniques are basically complementary and not primarily overlapped. Thus, these techniques are common not to be used alone, but rather to be invoked into the so called heuristics or rule-based scoring systems. As a matter of fact, heuristics is not so much a unique method rather a framework for combining various tests (such those we mentioned above) and assigning relative scores to their results; the summary of the resulting scores 1 Domain Name System Blacklists or Blocklists 2 Uniform Resource Identifier 3 Spam URI Real-time Block-lists 2

3 is finally compared to a preset threshold. If a message score exceeds the threshold then it is assumed that it is spam or if it is below the threshold then it is ham (i.e. not spam) [12][13]. A Survey for Spam Phenomenon in Greece The scope of our survey was to investigate the spam phenomenon in Greece, through the acquisition of feedback from the major players, such as Greek Internet service providers (ISPs), independent service providers, and academic institutions. The data collection techniques invoked the study of spam-related documentation, questionnaires and interviews with experts. Our survey data was collected via interviews with experts and the procedure was guided by a specialised questionnaire consisted with quantitative and qualitative data. In our case, expert consisted by IT directors, administrators, system administrators and other IT technical staff that have strong relationship in the administration of their systems at strategic or technical level. The key issues investigated in our survey were: i) spam awareness, ii) impact of spam, iii) costs related to spam, iv) spam legislation, v) anti-spamming, vi) Greek spamming and vii) the future of spam. Our questionnaire comprised of a total of sixty seven (67) questions that most of them were in closed-end format; and in the majority of the questions answerers were provided with the ability not to answer the question either due to unwillingness (i.e. I prefer not to answer ) or due to insufficiency of knowledge (i.e. I don t know ). Apart from the questionnaire, the discussion with the experts was indeed beneficial, covering trends on spamming and anti-spamming, as well as, feedback on how they currently handling the phenomenon and what are their opinion about spam. The survey took place in 2005 with the participation of experts from the major Greek ISPs, e- mail providers and educational institutions. It is important to say that our sample covered a significant portion of the population of the major players that exist nowadays in Greece; and with regards to the people participated, the majority of those were experts employed in educational institution and the rest were working for ISPs and independent hosting providers. Furthermore, the majority of experts interviewed were system administrators and administrators, some of them general directors and a small portion were technical personnel.[9] Key Findings and Recommendations The key findings derived from our survey can be summarized to the followings: As it was expected defining spam seems to be a little confusing; however, most dominant opinions are identifying spam as UCE and UBE. Spam is rather a very important issue to our sample of organizations. The percentage of s identified as spam in Greece seems to be quite similar to the global spam statistics [11][12]. This indicates that spam has analogous impact to Greece as worldwide; and as a matter of fact, Greeks should increase their concern about the spam phenomenon irrespectively to the difference of language. Almost all providers have been established some low-cost (mainly software-based) countermeasures to moderate spam effects, as well as, to eliminate users complains. Regarding spam legislation, it is essential that experts already recognize that spam phenomenon is not explicitly dedicated to the communication and they would like legislation to be rather sufficient; and why not stand alone. Our sample believe that the regulation of spam passes through legislation, penalties and an appropriate national agency, which with the assistance of ISPs should be able to bring actions against spammers. Major players seem also willing to provide necessary information, but they are skeptical to provide details regarding their customers. 3

4 The majority of providers use for anti-spamming the well-known DNSBLs and a significant portion has also enable heuristic techniques and custom filters to the serverend. Providers seem also to be quite satisfied with their tools, but they are concerned about filtering accuracy and the involvement of users to the process. A major problem that came to the surface is the manipulation of the identified spam, where our survey identified some misuse. Unfortunately not all messages identified as spam are really spam. By either moving these messages to separate folder or deleting them, we increase the change of missing important legitimate messages. Finally, almost half of experts believe that spam in Greek language are insignificant compared to the English-based and that it is quite rare; and for a portion of them also believe that it is difficult to be identified by anti-spam tools. Furthermore, half of the experts seem also worrying about the impact of spam to the spread of Internet in Greece. Finally, experts forecasts are unfortunately discouraged for both spam phenomenons worldwide, as well as, for spam in Greek language. We believe that spam phenomenon tends to be social rather than technological, and needs a unified approach and cross-border cooperation in order to be effectively reduced. Spammers are meant to take advantage of any broadband medium available and not only communication. Spam in mobile communication is actually expected to be highly increased into the following years and become a critical issue comparative with spam in communication [2]. Much the same, spam is expected to be spread into Internet Telephony and Voice over IP (VoIP) under the name SPIT 4, as well as, into Internet Instance Messaging (IM) (eg. ICQ and MSN Messager) under the name SPIM 5. [10] It is also amazing that recently spam has been also found to speak Greek. Indeed, during our experiments with the use of spam traps 6 that held from 21st March 2005 to 10th October 2005 (204 days), 10 spam messages found to be in Greek out of the total 125 spam messages, representing the 8%. Even though, Greek spamming is still rather small in contrast to the English-based, we should take proper actions to eliminate it before is too late. On the same hand, some international flavors of spam are shifting from annoying to threatening Internet users society. As a matter of fact, the amount of electronic frauds traveling though spam under the name Phishing 7 and Pharming has dramatically increased the last years [1][6]. With the term phishing, we actually mean the exposure of Internet users sensitive information such as credit card numbers, bank accounts and access passwords; and with the term pharming, we mean the decoy web sites where intruders redirect users in order to harvest their data [14][15]. Under these circumstances, we believe that national bodies should take immediate actions against spam phenomenon, set up or appoint an appropriate agency/operator that will lead into activities against spammers and their sponsors. On the same hand, with spam tending to constitute a major Internet security and e-fraud problem Internet Service Providers (ISPs) should also take actions by providing assistance to enforcement agencies along with undertaking of users education. We believe that ISPs should offer continuous and free guidance to users against spam, which should include what they should be aware, how to avoid spam, and how they should react. 4 Spam over Internet Telephony 5 Spam in Instant Messaging 6 A decoy address that is explicitly used for collecting spam is called spam honey pot or spam trap. 7 Phishing is derived from the words: Password Harvesting and fishing. 4

5 Acknowledgements Authors would like to mention that the survey was part of the MSc thesis of Mr. Anastasios Pallas under the title The spam phenomenon: techniques, countermeasures; and its distinctiveness in Greece ; and they would like to thank the people participated into this survey for spam, for their assistance and useful feedbacks. References [1] Anti-Phishing Working Group (APWG). Phishing Activity Trends Report. APWG, September 2005 ( [2] Brodt, Torsten and Janos Hee. Insights into Mobile Spam: World s First Collaborative Empirical Study. University of St. Gallen, Switzerland, [3] CAN-SPAM Act of 2003, Public Law , 108 th Cong., 1 st sess., 16 December 2003 ( [4] Directive 2002/58/EC. Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector O.J. (L 201) 37 ( [5] Koh, Eung Lyeol. Anti-Spam Toolkit: Existing and Emerging Technical Measures against Spam. Slide presentation. Spam Response Team, Korea Information Security Agency, 8 September [6] Matthew P., (2005). Pharmaing Is Latest Internet Security Threat. Inc.com, 20 June 2005 ( [7] Morris, John, (2003). Best Practices for End Users. Presentation to Internet Engineering Task Force 56, San Francisco, California, USA, March 2003 ( [8] Pallas A., (2005). Hide your from spammers ( [9] Pallas A. and Patrikakis C., (2006). The Spam Phenomenon in Greece, Countermeasures and Future Trends. Proceedings of the 2nd Conference on Electronic Democracy: Challenges of the Digital Era. Athens, Greece, March 16-17, [10] Patrikakis C. and Pallas A., (2006). Are we ready to face next-generation spam?. Cutter IT Journal. January 2006 Vol. 19, No 1. ISSN: [11] Symantec Corporation (2005). Symantec Spam Statistics - Monthly report analyzing Symantec's probe network data to identify trends. May 2005 ( [12] The Apache SpamAssassin Project (2004). Spam - What is spam? SpamAssassin Wiki (wiki.apache.org/spamassassin/spam). [13] The Spamhaus Project, (2006). "Effective Spam Filtering" ( [14] Wikipedia Web site ( [15] Wikipedia Web site ( [16] Wong M. and Schlitt W., (2005). Sender Policy Framework (SPF) for Authorizing Use of Domains in . Network Working Group Internet Draft, IETF ( 5

escan Anti-Spam White Paper

escan Anti-Spam White Paper escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA

Anti-Spam Measures Survey 2009. Pascal Manzano ENISA Anti-Spam Measures Survey 2009 Pascal Manzano ENISA Do you remember what happen on June 25 th? Methodology Online questionnaire open from May until July 2009 Questionnaire used providers best practices

More information

Draft WGIG Issues Paper on Spam

Draft WGIG Issues Paper on Spam Draft WGIG Issues Paper on Spam 1. Issue Spam directly engages a very wide range of stakeholders that includes individual consumers, all organizations of whatever size in the private and public sectors

More information

How to Stop Spam Emails and Bounces

How to Stop Spam Emails and Bounces Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant

More information

white paper Glossary of Spam Terms The jargon of the spam industry

white paper Glossary of Spam Terms The jargon of the spam industry white paper Glossary of Spam Terms The jargon of the spam industry Table of Contents A Acceptable Use Policy (AUP)..................................................... 5 Alias...........................................................................

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

How To Stop Spam From Being A Problem

How To Stop Spam From Being A Problem Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting

More information

Phoenix Information Technology Services. Julio Cardenas

Phoenix Information Technology Services. Julio Cardenas Phoenix Information Technology Services Julio Cardenas Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous

More information

Spam e-mail: How Malaysian e-mail Users Deal with It?

Spam e-mail: How Malaysian e-mail Users Deal with It? Spam e-mail: How Malaysian e-mail Users Deal with It? Yanti Rosmunie Bujang and Husnayati Hussin Abstract This paper attempts to discuss the spam issue from the Malaysian e-mail users perspective. The

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Enterprise Email Marketing: The 8 Essential Success Factors

Enterprise Email Marketing: The 8 Essential Success Factors Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing

More information

Is Spam Bad For Your Mailbox?

Is Spam Bad For Your Mailbox? Whitepaper Spam and Ham Spam and Ham A Simple Guide Fauzi Yunos 12 Page2 Executive Summary People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than

More information

SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE

SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE SPAM FILTERING IMPLEMENTATION USING OPEN SOURCE SOFTWARE AHMAD BAKHTIAR BIN IBRAHIM A PROJECT PAPER SUBMITTED IN PARTIAL FULFILMENT OF REQUIREMENT BARCHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND

More information

Emails and anti-spam Page 1

Emails and anti-spam Page 1 Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails

More information

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science

More information

The Network Box Anti-Spam Solution

The Network Box Anti-Spam Solution NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)

Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,

More information

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Comprehensive Email Filtering. Whitepaper

Comprehensive Email Filtering. Whitepaper Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses

More information

How To Block Ndr Spam

How To Block Ndr Spam How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR

More information

How To Stop Spam

How To Stop Spam Combating Spam: Policy, Technical and Industry Approaches INTRODUCTION Spam continues to be a significant problem for Internet users and operators, even as email filtering and blocking efforts by network

More information

Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.

Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH. Consequences of Spam and Virus Filtering for the E-Mail System 22C3 Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

How To Stop Spam From Being A Launching Point For Spam On Your Email Account

How To Stop Spam From Being A Launching Point For Spam On Your Email Account CMSGu2012-07 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Spam Control National Computer Board Mauritius Version 1.0

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

NETWORK RESOURCE THEFT PREVENTION Destroying the Economics of Spam

NETWORK RESOURCE THEFT PREVENTION Destroying the Economics of Spam 1 NETWORK RESOURCE THEFT PREVENTION Destroying the Economics of Spam A SpamSquelcher White Paper by eprivacy Group December, 2003 How true network perimeter anti-spam protection prevents spammers from

More information

Privacy, Data Collection and Information Management Practice Team November 13, 2003

Privacy, Data Collection and Information Management Practice Team November 13, 2003 Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted

More information

Email Marketing Workshop

Email Marketing Workshop Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation

More information

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction

More information

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework

Kingdom of Saudi Arabia Communication and Information Technology Commission. Public Consultation Document On the Anti-SPAM Policy Framework Kingdom of Saudi Arabia Communication and Information Technology Commission Public Consultation Document On the Anti-SPAM Policy Framework Rajab 1428 H (July 2007) 1. Introduction SPAM 1 represents a major

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007 COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different

More information

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of

More information

Email Security - A Holistic Approach to SMBs

Email Security - A Holistic Approach to SMBs Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new

More information

Messaging Firewall. W h i t e p a p e r. w w w. c m s c o n n e c t. c o m

Messaging Firewall. W h i t e p a p e r. w w w. c m s c o n n e c t. c o m Messaging Firewall W h i t e p a p e r w w w. c m s c o n n e c t. c o m Introduction Well, there's egg and bacon; egg sausage and bacon; egg and spam; egg bacon and spam; egg bacon sausage and spam;

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

5 tips to improve your email database. An Experian Data Quality white paper

5 tips to improve your email database. An Experian Data Quality white paper 5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

An Overview of Spam Blocking Techniques

An Overview of Spam Blocking Techniques An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now

More information

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques

More information

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...

More information

Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER

Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential

More information

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2

More information

Email Delivery Simplified White Paper

Email Delivery Simplified White Paper Email Delivery Simplified White Paper April 28, 2005 Prepared by StrongMail Systems, Inc. 1300 Island Drive, Suite 200 Redwood Shores, CA 94065 t. (650) 421-4200 f. (650) 421-4201 info@strongmailsystems.com

More information

How To Ensure Your Email Is Delivered

How To Ensure Your Email Is Delivered Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making

More information

SPAM. What can be done by governments, to prevent spam? What can be done by IT professional bodies?

SPAM. What can be done by governments, to prevent spam? What can be done by IT professional bodies? SPAM What can be done by governments, to prevent spam? What can be done by IT professional bodies? 2 SPAM - Professional Practice Group Presentation Introduction What is Spam? Spam Origin Spam Categories

More information

REPUTATION-BASED MAIL FLOW CONTROL

REPUTATION-BASED MAIL FLOW CONTROL WHITE PAPER REPUTATION-BASED MAIL FLOW CONTROL Blocking Extreme Spam and Reducing False Positives Blocking unsolicited commercial email or spam is an increasingly important but difficult task for IT staff.

More information

ANTI-SPAM FRAMEWORK OF BEST PRACTICES AND TECHNICAL GUIDELINES

ANTI-SPAM FRAMEWORK OF BEST PRACTICES AND TECHNICAL GUIDELINES NISER REPORT NISER-SPA-8020-3401 ANTI-SPAM FRAMEWORK OF BEST PRACTICES AND TECHNICAL GUIDELINES Issue 2.00 11 April 2005 National ICT Security and Emergency Response Centre MIMOS Berhad Technology Park

More information

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with

More information

Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools

Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools Spam Track Wednesday 1 March, 2006 APRICOT Perth, Australia James Carpinter & Ray Hunt Dept. of Computer Science and Software

More information

Adaptive Filtering of SPAM

Adaptive Filtering of SPAM Adaptive Filtering of SPAM L. Pelletier, J. Almhana, V. Choulakian GRETI, University of Moncton Moncton, N.B.,Canada E1A 3E9 {elp6880, almhanaj, choulav}@umoncton.ca Abstract In this paper, we present

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

China s Anti-Spam Works

China s Anti-Spam Works China s Anti-Spam Works Jingguang FU Ministry of Information Industry, China Geneva 7-9 July 2004 China s current situation of spam problem China is a serious victim of spam problem. A survey shows that

More information

A Phased Framework for Countering VoIP SPAM

A Phased Framework for Countering VoIP SPAM International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1

More information

Savita Teli 1, Santoshkumar Biradar 2

Savita Teli 1, Santoshkumar Biradar 2 Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,

More information

A Survey on Spam Filtering for Online Social Networks

A Survey on Spam Filtering for Online Social Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Using MDaemon AntiSpam for Spam Control

Using MDaemon AntiSpam for Spam Control Using MDaemon AntiSpam for Spam Control Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 Tel: (817) 525-2005 2003 Alt-N Technologies. All rights reserved. SPAM is a trademark

More information

Webinar: Reputation Services The first line of defense. July 26, 2005

Webinar: Reputation Services The first line of defense. July 26, 2005 Webinar: Reputation Services The first line of defense July 26, 2005 Speakers Richi Jennings - Moderator Richi Jennings Associates Dave Rand Chief Technologist, Internet Content Security Trend Micro John

More information

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,

More information

Spam: What Consumers Really Think

Spam: What Consumers Really Think From First Click to Lifetime Customer WHITE PAPER Spam: What Consumers Really Think Survey Finds Growing Anger; Advice for Avoiding Recipients Wrath SPAM: WHAT CONSUMERS REALLY THINK Survey finds growing

More information

How To Filter Email From A Spam Filter

How To Filter Email From A Spam Filter Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver

More information

Transactional Behaviour Based Spam Detection

Transactional Behaviour Based Spam Detection Transactional Behaviour Based Spam Detection By Thomas Choi A thesis submitted to The Faculty of Graduate Studies and Research in partial fulfilment of the degree requirements of Master of Applied Science

More information

Communications and Information Technology Commission. Suggested SPAM Monitoring Framework for CITC

Communications and Information Technology Commission. Suggested SPAM Monitoring Framework for CITC Communications and Information Technology Commission Suggested SPAM Monitoring Framework for CITC 23/02/2008 Submitted to: Submitted By: Suggested SPAM Monitoring Framework Identification of Legal Domains

More information

Review of Proposed Legislative Framework For the Control of E-mail Spam

Review of Proposed Legislative Framework For the Control of E-mail Spam Review of Proposed Legislative Framework For the Control of E-mail Spam Name: Job title: Company: Steven Sim Kok Leong IT Security Specialist Infocomm Security / QA, Computer Centre, NUS C. - Comment Q.

More information

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Current mail infrastructure Mail service in numbers: ~18 000 mailboxes ~ 18 000 mailing lists (e-groups)

More information

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail. Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform

More information

Protect your brand from phishing emails by implementing DMARC 1

Protect your brand from phishing emails by implementing DMARC 1 Protect your brand from phishing emails by implementing DMARC 1 Message from the Certified Senders Alliance supported by AOL, Microsoft and Google In the following article we want to clarify why marketers

More information

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the

More information

How to keep spam off your network

How to keep spam off your network GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam

More information

How To Prevent Spam From Being Filtered Out Of Your Email Program

How To Prevent Spam From Being Filtered Out Of Your Email Program Active Carrot - Avoiding Spam Filters Table of Contents What is Spam?... 3 How Spam Filters Work... 3 Avoid these common mistakes... 3 Preventing False Abuse Reports... 4 How Abuse Reports Work... 4 Reasons

More information

INBOX. How to make sure more emails reach your subscribers

INBOX. How to make sure more emails reach your subscribers INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Prevention of Spam over IP Telephony (SPIT)

Prevention of Spam over IP Telephony (SPIT) General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem

More information

Ipswitch IMail Server with Integrated Technology

Ipswitch IMail Server with Integrated Technology Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these

More information

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA

THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Communications and Information Technology Commission THE ANTI-SPAM REGULATORY POLICY FRAMEWORK FOR THE KINGDOM OF SAUDI ARABIA Final Version 23/02/2008 Submitted to: Submitted By: Acceptance of Deliverable

More information

Kaspersky Anti-Spam 3.0

Kaspersky Anti-Spam 3.0 Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is

More information

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10 Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk

More information

Powerful and reliable virus and spam protection for your GMS installation

Powerful and reliable virus and spam protection for your GMS installation Introducing integrated, Enterprise-grade malware protection for GMS on-premise deployments Malware protection from Gordano Messaging Services provides powerful anti-virus and anti-spam for all on-premise

More information

ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs

ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem Mark Sunner, Chief Technical Officer MessageLabs 6 th July 2004 MessageLabs MessageLabs protects businesses worldwide against email

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers?

What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers? ENISA 2009 spam survey December 09 Measures used by providers to reduce spam What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers? Third ENISA Anti-Spam

More information

Malicious Code and Spam in Wired and Wireless Environments: Problems and Solutions

Malicious Code and Spam in Wired and Wireless Environments: Problems and Solutions Malicious Code and Spam in Wired and Wireless Environments: Problems and Solutions Joel Sing and Ben Soh Department of Computer Science and Computer Engineering La Trobe University Bundoora VIC 3083, Australia

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

Comprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email

Comprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email : Barracuda Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email

More information

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI Product Comparison GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.0 Supports Microsoft Exchange Server 2003

More information

The spam economy: the convergent spam and virus threats

The spam economy: the convergent spam and virus threats The spam economy: the convergent spam and virus threats A Sophos whitepaper May 2005 SUMMARY Spammers, virus writers and hackers were once distinct communities with distinct motivations. However, the success

More information

Why Spamhaus is Your Best Approach to Fighting Spam

Why Spamhaus is Your Best Approach to Fighting Spam Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a

More information

DMA s E-Mail Authentication Requirement: FAQs and Best Practices

DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information